There is good and bad news around cybersecurity these days. The good news is that many CEOs and corporate boards no longer accept “good enough” security, and are willing to invest in best practices and leading security defenses to protect their organizations. So what’s the bad news? Many organizations continue to think of cyber-risk in terms of internal network penetration rather than as a more comprehensive strategy that includes all digital assets - websites, social networks, VIP and third-party partner exposure, etc. To address these risks, CISOs and risk officers must adopt a thorough digital risk management strategy that includes monitoring, filtering, prioritizing, and responding to threats across the public Internet and dark web. Digital Shadows specializes in this area and can help organizations with digital risk mitigation.

Threat Intel Fan?
Sign up below to get our TI updates delivered to your inbox!
Other content in this Stream

This guide outlines best practices for cyber threat intelligence and features resources to leverage when developing or improving your organization's cyber threat intelligence capabilities.

ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

A user of the cybercriminal forum RaidForums has offered 533 million records of Facebook user data for only a few US dollars.

ShadowTalk hosts Stefano, Dylan, Kim, and Chris bring you the latest in threat intelligence.

Insurance provider CNA Financial has announced it was targeted in a cyber attack, later confirmed as involving the newly identified “Phoenix Cryptolocker” ransomware.

Initial access brokers are benefitting from a rise in adoption of remote access software. This Initial Access Brokers Report analyzes this phenomenon and what it means for security practitioners.

ShadowTalk hosts Alec, Austin, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

The new Internet of Things (IoT) botnet ZHtrap has been turning devices it has infected into honeypots, in a novel technique that highlights yet another risk presented by exposed IoT devices.

ShadowTalk hosts Stefano, Adam, Kim, and first-timer Chris bring you the latest in threat intelligence.

Four zero-day vulnerabilities in Microsoft Exchange Servers have been linked to more than 30,000 cyber attacks taking place in the week following their discovery.

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence ...

ShadowTalk hosts Alec, Ivan, Charles, and Austin bring you the latest in threat intelligence. This week they cover: - The team discuss HAFNIUM and Microsoft Servers Exchange - Updates on the...

A new round of software attacks has raised another red flag concerning supply-chain security and the prevalence of third-party supply-chain targeting.

ShadowTalk hosts Alec, Ivan, Charles, and Digital Shadows CISO Rick bring you the latest in threat intelligence.

The People’s Republic of China-linked advanced persistent threat group “APT31” reportedly cloned and deployed a zero-day exploit developed by NSA's Equation Group in 2013.

This guide draws from best practices suggested in SearchLight’s playbooks, so security professionals can improve their tools and processes to prevent employee account takeover.

When selecting the optimal Cyber Threat Intelligence solution for your organization, use this guide to assess threat intelligence providers across 6 critical categories.

In this blog, we explore how cybercriminals are taking advantage of not-so-cheery sales this holiday season. From carding methods to account sales, nothing is off-limits.

We are here to go through the top five blogs of 2020—one for each quarter plus a bonus one to quickly recap why they (still) matter and be better prepared for the exciting new year in security.

While we’ve reported on recent Q3 ransomware campaigns targeting the healthcare industry, a new campaign targeting COVID-19 vaccine supply chain partners has emerged.